modeling lane dynamics

advertisement
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
MODELING LANE DYNAMICS
ABDUL MALIK KHAN & ANDREW P. PAPLIŃSKI
Faculty of Information Technology
Monash University
Clayton Campus, Wellington Road, Vic 3800
AUSTRALIA
{Malik.Khan, Andrew.Paplinski}@infotech.monash.edu.au
Abstract: - In campuses and other medium organizations, ATM networks co-exist with newer networks such as
Fast Ethernet, Gigabit and legacy Ethernet & Token-Rings. Such networks use ATM LAN emulation
(asynchronous transfer mode LANE) to access the ATM network. The need to have intelligent answers to questions
of cost, performance, and the direction of growth (trend analysis and capacity planning) that frequently arise
throughout the life cycle of the network drives network design experts to model and simulate the network. The
purpose of this paper is to study the details of the ATM LANE protocol in order to include, in a simulation model,
the required dynamics of the LANE traffic. Many simulation tools have no built-in modeling elements to simulate
networks with multiple ATM Emulated LANS (ELANs). The research work has resulted in a state-wise description
of the network operations in emulated LAN environment that helps create objects that could be used to model and
simulate LANE so as to improve the performance and interaction of ATM with newer generation of networks.
Key-Words: - Modeling, LAN Emulation, ATM Networks, LANE, LEC, LAD, ELAN.
1
INTRODUCTION
LAN Emulation and Configuration Server
(LECS).
ATM Switch: An ATM Switch is capable of
switching VCs and VPs.
LAN Emulation Server (LES). LAN Emulated
Server serves generic network applications such
as Web, Email etc. running over LANE. A client
running applications over LANE can connect to
the LANE server. LANE uses ATM as the data
link layer for transmitting data over an ATM
network
Broadcast and Unknown Server (BUS).
LAN Access Devices (LADs) or proxy-LECs.
These devices are the LAN access routers to the
legacy networks.
The tool used in this research work to model and
simulate the network is COMNET. The model's
topology consists of a number of nodes and links.
The nodes directly attached to the ATM switches
represent LECs, which are directly part of the
ELAN. They are assumed to have a LANE module
in their respective protocol stack modeled as session
source LANE-D, application source LANE-I, which
is described on the next page LES and BUS are
independent servers. A LAD is connected to both the
ELAN (ATM side) as well as a traditional Ethernet
LAN. All these nodes are modeled using a
COMNET [5] Computer & Communications node.
They are connected to the ELAN through point-topoint OC-3 or DS-1 links. Apart from the LAD,
workgroups are also connected to the Ethernet LAN,
using a COMNET Computer Group. [5, 7]
2
LAN Emulation (LANE)
2.1
LAN Emulation Components
Together, these components allow the formation
of an ELAN. The interactions between these ELAN
components are as follows: upon receipt of a traditional
LAN frame from the higher layer protocols, the LEC
performs its address resolution function. Each LEC
maintains a mapping (ARP cache) of known MAC
addresses to ATM addresses. However, this mapping
might not be exhaustive and furthermore is purged
periodically. When a frame is received with an unknown
MAC/ATM address, the LEC sends an address
resolution request to the LES. Each member of the
ELAN has to register its MAC/ATM address with the
LES upon joining the ELAN. If the LES has an entry for
the required ATM address, it replies to the LEC, which
is then able to set up a direct connection to the
destination using the connectionless AAL5 service. The
LAN Emulation and Configuration Server (LECS)
maintain information about all the ELANs. [7]
In LANE, a typical ELAN consists of the
following components:
LAN Emulation Clients (LECs). LANE
workstation is an Ethernet client, which has
generic network applications such as Web,
Email etc. running over LANE. It uses ATM
as the data link layer for transmitting data
over an ATM network.
ISBN: 978-960-6766-49-7
1
262
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
In the case where the LEC has to request the
address from the LES, only a single packet is
sent to the BUS for flooding.
The congestion is perceived to be in the internal
traffic of the network under study as opposed to
the traffic that is external to the network.
Within the transit network ELAN; the ATM
switches are interconnected by OC-3/DS-1 links.
Each legacy LAN (Ethernet) is terminated by a
computer object, which form’s a workgroup of 5
clients (approximated).
The network ELAN consists of 20-30 LAN
Emulation Clients (LECs). Four subnets are
identified as having LECs in the network area.
Each subnet consists of 5 LECs with traffic
sources and sinks.
In some cases, however, even the LES may
not have an entry for the MAC/ATM address pair; in
particular, if the destination MAC is hidden behind a
LAD or if it is part of another ELAN. For this
reason, the LEC also sends the first few frames of
the transmission to the BUS, which floods these
frames to all the members in the ELAN. At the same
time, the LES initiates an address resolution
protocol, possibly prompting other LESs for the
requested address. Should one of these flooded
frames reach the destination, possibly through an
LAD, the destination informs the LES about its
address. Again, once the address resolution is
completed, the source LEC establishes a data direct
VCC ATM connection to the destination using
AAL5 [1, 2].
This paper is organized as follows. A brief
introduction into the elements and operations of
LAN Emulation is provided followed by list of
assumptions made in the research. Following this are
the sections that detail the network under study and
enumerate the parameters for analyzing emulated
LANs. The details of the dynamics of LAN
emulation that result in a discrete, state-wise
description of the steps involved, follow in the next
section followed by a conclusion summarizing the
salient points.
2.2
Assumptions
The assumptions underlying the model are
as follows:
All the devices in the ATM part of the
model are included as members of the
ELAN. Total of four ELANs are defined.
The explicit address resolution protocol of
the server is not modeled. Instead, the
process is modeled by a time delay of 0.05
seconds. This simplification ignores some of
the network traffic, which is generated by
the ARP process. However, this traffic is
considered insignificant with respect to the
other traffic load in the network.
A LEC is assumed to have the destination
ATM addresses cached in 50% of all
transmissions. The other 50% of the
transmissions have to go through the LANE
process, as outlined above, simulating the
cases where the cache entry has either been
purged or when the destination is hidden
behind a LAD. Equal number of LEC’s and
Legacy LAN clients are defined.
ISBN: 978-960-6766-49-7
3
The Network Model
The ELAN itself is modeled by a COMNET
transit net. A single ATM switch or a group of
interconnected ATM switches represent the physical
aspects of the ELAN in the model. All the nodes of the
ELAN are connected to this switch through the OC-3 or
DS-1 links. The transit net retains its default network
service class and its default connection type [1].
However, the protocol of this connection is set to ATM
AAL5 with the following parameter values:
Basic protocol: Data bytes 48, overhead bytes 16 & other
parameters default.
Flow control: none, Policing: none & Rate control: none.
A number of COMNET default traffic sources define the
ELAN traffic. The LECs generate direct and indirect
traffic, the former representing those frames where the
LEC has the destination address cached; the latter
representing the case where the LEC has to go through
the LES. The direct traffic with suffix LANE-D is
generated using an COMNET node session source. The
destination of this direct message source is either the
remaining LEC, or the LAD. A COMNET node
application source is also associated with each LEC.
This source models the indirect traffic, which has to go
through the LES. [5, 7]
Traffic components of LEC are as follows:
LANE-D:
Traffic source to model direct ATM connections (the
LEC has the MAC address of the destination in its
cache). Modeled as a message source.
Destination: Random list of all LECs and LADs of that
ELAN
LANE-I:
Traffic source to model indirect ATM connections
(wherein the LEC does not have the MAC address of
the destination in its cache). Modeled as an application
source.
263 2
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Sequence of commands:
SendARP – sends ARP request of 28bytes
Broadcast
Await Response – Responds to any default received
message text
Setup LANE
The first command sends a 30-byte message
to the LES to simulate the address resolution
request. This command is defined as a global
transport command, and hence it is available to all
the application sources in the model. At the same
time, the application sends a message to the BUS by
executing the command „Broadcast‟. After these two
transmissions, the application then waits for a
response from the LES. This is implemented in the
model in the form of a global filter command. The
message to wait for is set to „ARP‟, which
corresponds to the message text by which the LES
responds to the request. Upon arrival of such a
message, indicating that the address resolution
request has been terminated, the LEC then
establishes a connection with either the other LEC or
the LAD. This is modeled using a local session
command, the parameters of which are identical to
those outlined under the direct transmission above
[1, 2, 5, and 7].
Connected to the LES is a single COMNET
process response source. This source is triggered
upon arrival of the 28-byte message, which is
generated by the execution of the command „send
ARP‟ on the LECs. After the delay of 0.05 sec for
address resolution, the response source returns a 28byte message to the requesting LEC. This message is
associated with the text „ARP‟, which, upon arrival
at the LEC, triggers the continuation of the LEC‟s
command sequence.
LES
A response source “ARP” is used to model the address
resolution on the LES.
Scheduling: By received messages generated by the
LECs for address resolution.
A single COMNET process model message
source named „Flood‟ is attached to the BUS. This
source is responsible for flooding a single packet.
The source is triggered by the message „Broadcast‟,
which is sent by executing the command „Broadcast‟
on the LEC. Upon arrival of such a message, the
source then forwards the incoming message to all the
members on the ELAN. The model can easily be
modified to simulate the flooding of several packets,
not just a single packet, as indicated in the list of
assumptions. To determine the destination of this
flooded message, the „multicast‟ algorithm is used.
ISBN: 978-960-6766-49-7
The list contains all the nodes, which are part of the
ELAN.
BUS
A message source “Flood” is used to model the broadcast
operation in LANE. A broadcast is sent to a multicast list
comprising all LECs, LADs & Ethernet workgroups.
Scheduling: By received broadcast request from the LECs.
The interactions of the ELAN with the
traditional Ethernet LAN are modeled at the LAD. The
process node model is associated with three process
traffic sources labeled „LANE‟, „LANE-FwI‟, and
„LANE-FwD‟. The principal function of these sources is
to convert the protocol stack between the Ethernet LAN
and the ELAN. The two sources, „LANE-FwI‟ and
„LANE-FwD‟, handle the traffic from Ethernet to the
ELAN. The source, „LANE‟, handles the traffic in the
other direction.
The message source, „LANE‟, is triggered by
indirect and direct messages from the LECs,
respectively. Notice that the LECs' operations, as
described above, do not establish a connection with the
workstations on the traditional LAN directly. Instead,
the direct and indirect traffic is transmitted to the LAD,
since the connection-oriented ATM protocol cannot be
part of the traditional Ethernet LAN. The source,
„LANE‟, is triggered by any message originating from
either LECs, then assembles the message and transmits it
in a connectionless mode to any one or more of the
workstations on the traditional LAN. The parameter
settings for this traffic source are as follows:
LAD (LAN Access Device)
A message source, a session source, and an application
source are used to model the traffic to and from the
LAD.
LANE:
A message source, LANE, models the traffic from the
LECs to the Ethernet workgroups. Scheduled by
received message “LANE” from the LECs.
Routing class: Standard; Transport protocol: Ethernet.
Destination: Random list of Ethernet workgroup
computers across the corresponding LAD.
LANE-FwD:
A process session source model, LANE-FwD, is used
to model the direct traffic from the Ethernet workgroup
computers to the LECs.
LANE-FwI:
An application process source, LANE-FwI, is used to
model the indirect traffic from the Ethernet workgroup
computers to the LECs. The command sequence for
this application is as follows:
SendARP – sends ARP request of 28 bytes to the
corresponding LES
264 3
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Broadcast
Await Response – Responds to any default received
message text
Setup LANE – Messages to a random list of all LECs
and corresponding LADs
Similarly, the workstations on the traditional
LAN do not directly establish a connection with the
LECs. Instead, they transmit their messages to the
LAD. This is indicated in the model through the two
COMNET process message sources with the
suffixes ‘LANE/D’ and ‘LANE/ I’, respectively,
which are connected to the computer group icon.
These sources generate a connectionless traffic to
the LAD using the Ethernet protocol. The only
difference between both sources is the name of the
source, which is subsequently used as a trigger at the
LAD. The process source with the suffix ‘LANE/D’
triggers the COMNET session source named
‘LANE-FwD’, whereas the process source with the
suffix ‘LANE/I’ triggers the application process
source named ‘LANE-FwI’. The two forwarding
sources are very similar to the sources connected to
the LECs. ‘LANE-FwD’ generates messages with
one of the LECs as destination following the
Ethernet protocol. Like above, the Ethernet frames
are segmented into ATM AAL5 cells on the ELAN.
Similarly, the message source, ‘E-LANE/I’, triggers
the application source, ‘LANE-FwI’, which again
executes the command sequence of commands:
Send ARP
Broadcast
Await Response
LANE
LEGACY WORKGROUP COMPUTERS
Two process messages sources – one each for direct
and indirect, are used to model the traffic from legacy
LANs to the LECs.
With the suffix LANE /D:
Traffic source to model direct ATM connections
(wherein the MAC address of the destination is with
the LAD). Modeled as a process message source.
Destination: Corresponding LAD
With the suffix LANE /I:
Traffic source to model indirect ATM connections
(wherein the MAC address of the destination is not
with the LAD). Modeled as a message source.
Destination: Corresponding LAD
The parameters for these commands are
identical to those described above. Here, the
modules defining the ELAN are no longer associated
with dedicated physical nodes. Instead, they are
represented by the traffic sources only. The ELAN is
thus modeled through the relationships between the
ISBN: 978-960-6766-49-7
sources that are established through triggers and the
destination lists of the sources.
Figures 14 and 15 show the snapshots of model
developed. These models represent the traffic
engineering and LANE dynamics.
4
Dynamics of ELAN traffic
Traffic flow dynamics were modeled using the
node model, process model and interface attributes for
message response and session source objects.
Application configuration and User configuration
objects are used to model different combinations of
traffic parameters and types with user profiles. A typical
example of the most common activities on the network
includes email, web browsing, video audio streaming
and videoconferencing. Dynamics of LANE are shown
in figure 1.
The email transactions at the client side were
split into two traffic types – one corresponding to a user
sending email and the other corresponding to the user
receiving email. On COMNET, these were respectively
represented by a message source that sends the email to
the mail server and another message source that triggers
the mail server to send the mail. The email transactions
on the mail server side were split into two traffic types –
one corresponding to the mail server receiving and
storing the mail and the other corresponding to the mail
server reading and sending the mail. In COMNET, these
were respectively represented by an application source
that responds to the client mail send requests and
receives the email, and another application source that
responds to the client mail receive requests and transfers
the mail.[5,7]
The web service at the client side is modeled
using a traffic message source that requests web pages
through a proxy server and sets up a web session. At the
proxy server, the response to this request is modeled
using an application source.
The proxy LECs serve the edge devices, local
LAN, and remote LAN. Each of these routers supports
Token-Ring and Ethernet segments. All the segments are
terminated with a set of workgroup computers, each
having 10 users. Each user generates email, web, and
audio video streaming traffic requests from the services
that are attached to the network ELAN.
All the traffic generated from the Token-Ring
and Ethernet segments are directed to the proxy LEC.
The routers use ATM adaptation layer protocol AAL5 to
forward the traffic from the legacy Token-Ring/Ethernet
side to the ATM side.
265 4
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Traffic profiles were decided on the basis of access
patterns of typical users in the network. Two
workload components are considered in the model:
e-mail, and web. The traffic parameter values of
each traffic scenario are summarized in Table 1. The
workload intensity parameters are described below:
E-mail:
E-mailRequestSize
E-mailInterarrival
E-mailSize
Web:
WebRequestSize
WebInterarrival
WebPageSize
an application source that is used to model the process of
the LAD forwarding the mail request from the client to
the server. This application source, called ‘Email Send
LANE-FwD’, generates the message called ‘Email-Send’
destined for the mail server and of size
‘EmailRequestSize’. At the mail server, an application
Low Load
Medium Load
Heavy Load
100 bytes
Exp 720 sec
Exp (1 KB)
100 bytes
Exp 360 sec
Exp (3 KB)
100 bytes
Exp 180 sec
Exp (5 KB)
100 bytes
Exp 360 sec
Exp (30 KB)
100 bytes
Exp 120 sec
Exp (100 KB)
100 bytes
Exp 120 sec
Exp (200 KB)
Table 1 Workload components and traffic parameters under different loads
E-mailRequestSize: It is the size of the
initial packet generated by a mail client.
This packet represents the request initiated
by the client to read or receive the email
from the mail server.
E-mailInterarrival: It is the rate at which
emails are sent or received by a mail client.
E-mailSize: For a mail client, this variable
represents the size of the email sent to the
mail server. For the operation of a mail
receive, this means the size of the email
received from the mail server.
WebRequestSize: It is the size of the packet
generated by a web client. This packet
represents the request to retrieve a web page
from the web server.
WebInterarrival: It is the rate at which a
client generates web requests (http, ftp etc).
WebSize: The size of the web page
requested by a web client and provided by
the web server.
4.1
Dynamics of Email transactions:
Typically, mail transactions consist of mail
send and receive activities. The process of sending
and receiving email is modeled separately.
A message source is used to model the process of a
client sending email. The client generates an email
send request called ‘EmailSendRequest’ of size
‘EmailRequestSize’. The frequency of this is
governed by the parameter ‘EmailInterarrival’. On
any LEC, the message text of this message is
‘Email-Send’ and the destination is the mail server.
On a node attached to a legacy LAN, this request is
destined to the corresponding LAD or the proxyLEC. At the LAD, the ‘EmailSendRequest’ triggers
ISBN: 978-960-6766-49-7
source is used to model the process of receiving the user
mail and storing it. This application source ‘Exchange
Store’ is triggered by the message with message text
‘Email-Send’.
A message source is used to model the process
of a client generating an email receive request. This
request, called ‘E-mailReceiveRequest’, is generated
every ‘E-mailInterarrival’ seconds and its size is ‘EmailRequestSize’. On any LEC, the message text of this
message is set to ‘E-mail-Receive’ and the destination is
the mail server. On a node attached to a legacy LAN,
this request is destined to the corresponding LAD or
proxy-LEC. At the LAD, the ‘E-mailReceiveRequest’
triggers an application source ‘E-mail Receive LANEFwD’ that is used to model the process of the LAD
requesting the user mail from the mail server. This
application source generates a message with text ‘Email-Receive’ and size ‘E-mailRequestSize’ destined for
the mail server. At the mail server, a response source is
used to model the process of processing the mail request
and then delivering the mail. This response source
‘Exchange Transfer’ is triggered by the message with
message text ‘E-mailReceive’, which in return sets the
text of its reply to ‘UserMail’. The response source
responds by replying to the node at which the message
originated. LECs receive the requested emails directly.
For the clients on the legacy LANs, the email receive
request is forced to go through the LAD to reach the
mail server. Hence, the response source always sends the
mail to the LAD from which the request originated. At
the LAD, a message source, ‘Email-LANE’, is used to
transfer the messages received from the mail server to
the client. This message source triggers on the arrival of
the message with text ‘UserMail’, which is generated by
the mail server and which represents the message with
the user mail in it. For the purpose of collecting and
monitoring statistics, the application type of all email
transactions is set to ‘Email’. [6, 7]
266 5
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
A processing node models the behavior of
the Exchange mail server with a storage capacity of
20 Gigabytes. This source models the Exchange
Store, which saves the mails of all users on its local
hard disk & Exchange Transfer, which reads and
transfers the mails of individual clients.
The time sequence diagram of the mail
exchange operation of legacy LAN clients is shown
in Figure 2, and a similar diagram for the mail
exchange operation of the LAN emulation clients is
shown in Figure 3.
4.2
collecting and monitoring statistics, the application type
of all web transactions is set to „Web‟.
A processing node with default parameters
achieves the modeling of web servers. To fully
understand the interactions between a web client and a
proxy server, please refer to the time sequence diagram
of the web application shown in Figures 4 and 5.
5
Simulation Scenarios
The simulation was executed with the following
three “what-if” scenarios as shown in the above Table 1:
Dynamics of Web Transactions
5.1
Typically, a web transaction consists of a
client requesting a web page from a web server. The
server is directly attached to the ELAN. Two web
servers are used in this model and any one of
them can service a particular client request. A
message source is used to model the process of a
client sending a web request. The client generates a
web page retrieve request called „Web E-LANE/D‟
of size „WebRequestSize‟. The frequency of this is
governed by the parameter, „WebInterarrival‟. On
any LEC, the message text of this message is
„WebClient‟ and the destination is the web servers.
On a node attached to a legacy LAN, this request is
destined to the corresponding LAD or the proxyLEC. At the LAD, the „Web E-LANE/D‟ triggers a
session source that is used to model the process of
the LAD forwarding the web request from the client
to the servers. This session source, called „Web
LANE-FwD‟, generates the message called
„WebClient‟ destined for the web servers and of size
„WebRequestSize‟. At the web server that receives
the request, a response source is used to model the
process of receiving the user web page request and
sending the web page to the requester. This response
source, „ProxyResponse‟, is triggered by the
message with the message text, „WebClient‟. Itself
sets the text of its reply to „UserWebPage‟. The
response source responds by replying to the node at
which the message originated. LECs receive the
requested web page directly. For the clients on the
legacy LANs, the web page request is forced to go
through the LAD to reach the web server. Hence, the
response source always sends the web page to the
LAD from which the request originated. At the
LAD, a message source „Web LANE‟ is used to
transfer the web pages received from the web
server(s) to the clients. This message source triggers
on the arrival of the message with text
„UserWebPage‟ which is generated by the web
server(s) and which represents the message with the
user requested web page in it. For the purpose of
ISBN: 978-960-6766-49-7
Scenario-1: Low Email and Web Load
Typically, an email client generates 5 emails per
hour exponentially distributed and of the size 1KB. A
web client requests web pages of size 30KB at the rate of
10 pages per hour exponentially distributed.
5.2
Scenario-2: Medium Email & Web Load
Typically, an email client generates 10 emails
per hour exponentially distributed and of the size 3KB.
A web client requests web pages of size 100KB at the
rate of 30 pages per hour exponentially distributed.
5. 3
Scenario-3: Heavy Email and Web Load
Typically, an email client generates 20 emails
per hour exponentially distributed and of the size 5KB.
A web client requests web pages of size 200KB at the
rate of 30 pages per hour exponentially distributed.
6
Conclusion
This paper has presented ways to model and
simulate emulated LANs in ATM networks using
COMNET. A detailed state-wise description of the LAN
emulation process has been achieved. Test simulation
runs have been done on different traffic scenarios and
results obtained.
The results of the above scenarios are shown in
the following figures (figure-6 to 13). In all the above
scenarios the link utilization for different links were
studied. Expectedly the results inferred from our study
show the link utilization for slower links (T1, E1, etc) is
much higher when compared to the high-speed links.
The link utilization and performance was also compared
as the load was increased from medium to heavy. The
results we got were what we expected. The results also
show successful modeling of LANE dynamics, the
results shown in figures-6 to 13 show clients from ATM
networks (LANE client) and legacy Ethernet and TokenRing networks. The LAN clients successfully
communicated with the Application server serving those
267 6
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
applications. Similarly the LEC‟s which are
connected and assigned different ELAN‟s also
communicated across ELAN‟s and the server.
8
Figures
This paper has described the LAN emulation over
ATM client/server model. LAN emulation is an
ATM service that provides the migration from
existing LANs to an ATM environment. LAN
emulation does what its name implies; it emulates
the operation of traditional LANs, and in doing so,
makes the connection-oriented nature of ATM
transparent to existing applications on all end-user
workstations. This paper also describes the
functions, frame formats and protocols used by LAN
emulation as specified by the ATM Forum. It shows
how to model and implement LAN emulation over
ATM.
Ways to improve this work would be to
extend the methodology to include quality-of-service
parameters in the model. A significant result could
be achieved by having a real-time network topology
and traffic integrated into the network model to
validate and increase the accuracy of the modeled
network.
7
Figure 1 Time Sequence diagram representing modeling
of LANE
References
[1]
Modeling ATM networks with ATM Forum
Technical Committee: LAN Emulation over ATM,
Version 4.0, af-lane-0021.000, January 2001.
[2]
H.J.R. Dutton and P. Lenhard, ATM
Technical Overview, Prentice Hall, New Jersey,
2005.
[3]
J. M. Pitts, J. A. Schormans, Introduction to
ATM Design and Performance: With Applications
Analysis Software, John Wiley & Sons, 2000.
[4]
D. D. Kouvatsos, International Federation
for information, ATM Networks: Performance
Modeling and Analysis, Chapman & Hall, 1996.
[5]
COMNET III is a performance analysis
tool for communications networks from CACI
[6]
Matthew
J.
Castelli,
Network
Consultants Handbook, Cisco press 2003.
[7]
Campus ATM LAN Emulation and
Classical IP Implementation Guide, IBM
Technical support Organization, 2004
Figure 2 Time sequence diagram of mail exchange
operation of legacy LAN clients
ISBN: 978-960-6766-49-7
268 7
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Figure 5 The time sequence diagram of the web page
request operation by LECs
Figure 3 Time sequence diagrams of the mail
exchange operation of the LECs
Figure 6 VCC count for the three scenarios. Note that
the VCC count is same for all scenarios
Figure 4 The time sequence diagram of the web
page request operation by legacy LAN clients
ISBN: 978-960-6766-49-7
Figure 7 LANE throughputs in bits/sec for the three
scenarios. Note that the throughput varies for all the
scenarios
269 8
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Figure 8 Ethernet delay for the three scenarios. Note
that the Ethernet delay increases as the traffic load
increases.
Figure 11 HTTP Web page response time for Low,
Medium and High load. Note that the time response
increases as the load increases.
Figure 9 ATM AAL5 delay for the three scenarios.
Note that the ATM AAL5 delay increases as the
traffic load increases.
Figure 12 Graph of top link Utilization. Link T1 and
link E1 which has the highest utilization (average 10%).
The graph is for Low Load of Web
Figure 10 ATM AAL5 delay Variation for the three
scenarios. Note that the ATM AAL5 delay variations
increases as the traffic load increases.
ISBN: 978-960-6766-49-7
Figure 13 Graph of top link Utilization. Which has the
highest utilization (reaches saturation on an Average of
99%). The graph is for High Load Web.
270 9
ISSN: 1790-5117
7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008
Figure 14 Snapshot of the Network model with LANE dynamics and traffic engineering.
Figure 15 Snapshot of the network model with LANE dynamics, traffic engineering and interfacing
ISBN: 978-960-6766-49-7
27110
ISSN: 1790-5117
Download